Network & Information Technology
Network & Information Technology
Network & Information Technology
Technology;
Introduction to Xerosploit
Dependencies
nmap
hping3
build-essential
ruby-dev
libpcap-dev
libgmp3-dev
tabulate
terminal tables
Port scanning
Network mapping Dos
attack
Html code injection
Javascript code injection
Download interception and replacement Sniffing
DNS spoofing
Background audio reproduction
Images replacement
Drifnet
Webpage defacement and more
Man-In-The-Middle
Xerosploit Installation
Xerosploit is an attack tool for MITM which can run only on Linux OS to
do so follow the simple steps:-
It will ask to choose your operating system, here we have press 1 for
Kali Linux.
Above image is grid list of man in the middle attack commands:
scan
This command will scan the complete network and will found all devices
on your network.
As you can observe that it has scanned all the active hosts. There are so
many hosts in this network; you have to choose your target from the given
result. I am going to select 192.168.1.105 for the man in the middle attack.
Sniff
Now run the following module to sniff all the traffic of the victim with
the command:
1 sniff
1 run
Now it will ask you if you want to use SSLTRIP to strip the HTTPS
URL’s to HTTP so that we can catch the login credentials in clear text.
So enter y.
In cryptography and computer security, a man-in-the-middle attack
(MITM) is an attack where the attacker secretly relays and possibly
alters the communications between two parties who believe they are
directly communicating with each other.
How SSL works?
As you learned in the previous chapter, https uses SSL protocol to
secure the communication by transferring encrypted data. Before
going deeper, learn how SSL works.
1. Asymmetric Cryptography
2. Symmetric Cryptography
Asymmetric Cryptography
Asymmetric cryptography (also known as Asymmetric Encryption or
Public Key Cryptography) uses a mathematically-related key pair to
encrypt and decrypt data. In a key pair, one key is shared with anyone
who is interested in a communication. This is called Public Key. The
other key in the key pair is kept secret and is called Private Key.
Here, the keys referred to a mathematical value and were created using
a mathematical algorithm which encrypts or decrypts the data.
Asymmetric Cryptography
SSL uses asymmetric cryptography to initiate the communication which
is known as SSL handshake. Most commonly used asymmetric key
encryption algorithms include EIGamal, RSA, DSA, Elliptic curve
techniques and PKCS.
Symmetric Cryptography
In the symmetric cryptography, there is only one key which encrypts and
decrypts the data. Both sender and receiver should have this key, which is
only known to them.
Symmetric Cryptography
SSL uses symmetric cryptography using the session key after the initial
handshake is done. The most widely used symmetric algorithms are
AES-128, AES-192 and AES-256.
SSL Communication
As you can see in the above figure, SSL communication between the
browser and the web server (or any other two systems) is mainly
divided into two steps: the SSL handshake and the actual data transfer.
Secure Sockets Layer (SSL) and Transport Layer Security (TLS), are
cryptographic protocols used to provide secure communications across
the Internet.
These protocols have been widely used in secure applications like the
Internet messaging and e-mail, web browsing, and voice-over-IP.
These protocols are used across the Internet, they were started in the
mid of1990s and are increasingly coming under attack. SSL Version
2.0 (Version 1.0 was never publicly released) contains a significant
number of flaws that can be exploited, such as poor key and are
vulnerable to man-in-the-middleattacks.
Although most users use Version 3.0 protocol and its newer versions of
TLS, a misconfiguration can still lead to vulnerability.
Download the openssl source code, and apply the patches, update the
configuration files, and then rebuild the application. Use the following
commands:
Using Vpn
Many enterprises will insist that their employees use their VPN if
they're working remotely by connecting to their office network from
home. Sometimes people will use a VPN when they're using BitTorrent
to pirate media so that they don't get caught and their ISP can't stop
them. I don't condone piracy. But to those people, I strongly suggest
avoiding VPNs which are advertised through ads on The Pirate Bay as
they are likely not what they seem and may even be malicious.
Sometimes people use VPNs because they're understandably
conscientious of their everyday security. That's an excellent reason to
use them.